UIC Bezel5 Programmer’s Manual
Page.8/166
UDN PM098 Rev. 1.0
Copyright © 2013, Uniform Industrial Corp. All Rights Reserved
5.2.1.
(C8H) – Activate/Deactivate Contactless/MSR Reading command .......................................... 11
5.2.2.
(C9H) – Response of Start Transaction ................................................................................... 11
5.2.3.
(CEH) – Return the Specific EMV Tags .................................................................................... 11
6.
AUTHENTICATION AND CARD DATA ENCRYPTION ???............................................................11
6.1.
D
ATA
S
ECURITY AND
K
EY
M
ANAGEMENT
.......................................................................................... 11
6.2.
P
RODUCT
L
IFE
C
YCLE
................................................................................................................... 11
6.3.
O
PERATION
F
LOW
....................................................................................................................... 11
6.4.
A
UTHENTICATION
........................................................................................................................ 11
6.5.
D
OUBLE
DUKPT ........................................................................................................................ 11
6.5.1.
Auto Rollover 1: key generation............................................................................................. 11
6.5.2.
Auto Rollover 2: key generation............................................................................................. 11
6.6.
T
RACK
O
UTPUT FORMAT
(S
ELF
-A
RM
).............................................................................................. 11
6.6.1.
RS232/USB Virtual................................................................................................................. 11
6.6.2.
HID MSR (Optional)............................................................................................................... 11
6.7.
A
DMINISTRATION
C
OMMANDS
...................................................................................................... 11
6.7.1.
90H 02H – Load Session ID .................................................................................................... 11
6.7.2.
90H 03H – Get KSN & Encrypted Random.............................................................................. 11
6.7.3.
90H 04H – Select DUKPT Key Slot .......................................................................................... 11
6.7.4.
90H 05H – Select DUKPT Management Mode........................................................................ 11
6.7.5.
90H 06H – DUKPT Key Iteration Test ...................................................................................... 11
6.7.6.
90H 07H – Get Encrypted Status............................................................................................ 11
6.7.7.
90H 10H – Get Challenge....................................................................................................... 11
6.7.8.
90H 11H – Load Encrypt Initial Key ........................................................................................ 11
6.7.9.
90H 12H – Change Encrypt Mode for Data Output Format..................................................... 11
6.8.
L
OAD
S
ESSION
ID........................................................................................................................ 11
6.9.
L
OAD
DUKPT
K
EY
...................................................................................................................... 11
6.10.
L
OAD
G
OOGLE
W
ALLET
M
ERCHANT
S
YMMETRY
K
EY
........................................................................... 11
6.11.
L
OAD
A
UTHENTICATION
RSA
K
EY
................................................................................................... 11
6.12.
C
HANGE
E
NCRYPT
M
ODE FOR
D
ATA
O
UTPUT
F
ORMAT
........................................................................ 11
7.
GOOGLE WALLET ....................................................................................................................11
7.1.
T
RACK
O
UTPUT
S
CENARIOS
........................................................................................................... 11